• Title/Summary/Keyword: Role Based Access Control

Search Result 272, Processing Time 0.028 seconds

A Study on the Spatial Organization of Outpatient departments in the Infectious Disease Hospital by Region (권역별 감염병전문병원의 통원진료부문 공간구성에 관한 연구)

  • Lee, Joo Rang
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.26 no.2
    • /
    • pp.73-84
    • /
    • 2024
  • This study investigated the outpatient departments of Infectious Disease Hospitals by Region, which play an important role in establishing regional medical networking, to find a spatial structure that can provide a safe environment for efficient diagnosis and treatment, as well as a rational medical procedure in case of crisis. Department layout and adjacencies were derived by considering the access procedures according to patient classification, medical procedures by department, and connectivity with other departments. Based on the results derived by setting up zones according to infection control, activities, and objects, and analyzing the division of zones, the composition of areas by activities, movement flows by objects and treatment units, it can be used as basic data for the architectural plan of the Infectious Disease Hospital. Also, there are implications that can be used as basic data for planning related facilities by analyzing spatial relationships according to user behavior.

Design of Security Service Model in Dynamic Cloud Environment (동적 클라우드 환경에 적합한 보안 서비스 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.2
    • /
    • pp.35-41
    • /
    • 2012
  • The rapid development of cloud computing and mobile internet service changes to an mobile cloud service environment that can serve and pay computing source that users want anywhere and anytime. But when user misses mobile device, the respond to any threat like user's personal information exposal is insufficient. This paper proposes cloud service access control model to provide secure service for mobile cloud users to other level users. The proposed role-based model performs access authority when performs user certification to adapt various access security policy. Also, the proposed model uses user's attribute information and processes before user certification therefore it lowers communication overhead and service delay. As a result, packet certification delay time is increased 3.7% and throughput of certification server is increased 10.5%.

  • PDF

Roles of Cancer Registries in Enhancing Oncology Drug Access in the Asia-Pacific Region

  • Soon, Swee-Sung;Lim, Hwee-Yong;Lopes, Gilberto;Ahn, Jeonghoon;Hu, Min;Ibrahim, Hishamshah Mohd;Jha, Anand;Ko, Bor-Sheng;Lee, Pak Wai;MacDonell, Diana;Sirachainan, Ekaphop;Wee, Hwee-Lin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.4
    • /
    • pp.2159-2165
    • /
    • 2013
  • Cancer registries help to establish and maintain cancer incidence reporting system, serve as a resource for investigation of cancer and its causes, and provide information for planning and evaluation of preventive and control programs. However, their wider role in directly enhancing oncology drug access has not been fully explored. We examined the value of cancer registries in oncology drug access in the Asia-Pacific region on three levels: (1) specific registry variable types; (2) macroscopic strategies on the national level; and (3) a regional cancer registry network. Using literature search and proceedings from an expert forum, this paper covers recent cancer registry developments in eight economies in the Asia-Pacific region - Australia, China, Hong Kong, Malaysia, Singapore, South Korea, Taiwan, and Thailand - and the ways they can contribute to oncology drug access. Specific registry variables relating to demographics, tumor characteristics, initial treatment plans, prognostic markers, risk factors, and mortality help to anticipate drug needs, identify high-priority research area and design access programs. On a national level, linking registry data with clinical, drug safety, financial, or drug utilization databases allows analyses of associations between utilization and outcomes. Concurrent efforts should also be channeled into developing and implementing data integrity and stewardship policies, and providing clear avenues to make data available. Less mature registry systems can employ modeling techniques and ad-hoc surveys while increasing coverage. Beyond local settings, a cancer registry network for the Asia-Pacific region would offer cross-learning and research opportunities that can exert leverage through the experiences and capabilities of a highly diverse region.

An Intelligent CCTV-Based Emergency Detection System for Rooftop Access Control Problems (옥상 출입 통제 문제 해결을 위한 지능형 CCTV 기반 비상 상황 감지 시스템 제안)

  • Yeeun Kang;Soyoung Ham;Seungchae Joa;Hani Lee;Seongmin Kim;Hakkyong Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.59-68
    • /
    • 2024
  • With advancements in artificial intelligence technology, intelligent CCTV systems are being deployed across various environments, such as river bridges and construction sites. However, a conflict arises regarding the opening and closing of rooftop access points due to concerns over potential accidents and crime incidents and their role as emergency evacuation spaces. While the relevant law typically mandates the constant opening of designated rooftop access points, closures are often tacitly permitted in practice for security reasons, with a lack of appropriate legal measures. In this context, this study proposes a detection system utilizing intelligent CCTV to respond to emergencies that may occur on rooftops. We develop a system based on the YOLOv5 object detection model to detect assault and suicide attempts by jumping, introducing a new metric to assess them. Experimental results demonstrate that the proposed system rapidly detects assault and suicide attempts with high accuracy. Additionally, through a legal analysis of rooftop access point management, deficiencies in the legal framework regarding rooftop access and CCTV installation are identified, and improvement measures are proposed. With technological and legal improvements, we believe that crime and accident incidents in rooftop environments will decrease.

An User Authorization Mechanism using an Attribute Certificate in the IPSec-VPN System (IPSec-VPN 시스템에서의 속성 인증서를 이용한 사용자 접근 제어 방안)

  • 강명희;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.11-21
    • /
    • 2004
  • To authorize IPSec-VPN Client in Client-to-Gateway type of the IPSec-VPN system, it can be normally used with ID/Password verification method or the implicit authorization method that regards implicitly IPSec-VPN gateway as authorized one in case that the IPSec-VPN client is authenticated. However, it is necessary for the Client-to-Gateway type of the IPSec-VPN system to have a more effective user authorization mechanism because the ID/Password verification method is not easy to transfer the ID/Password information and the implicit authorization method has the vulnerability of security. This paper proposes an effective user authorization mechanism using an attribute certificate and designs a user authorization engine. In addition, it is implemented in this study. The user authorization mechanism for the IPSec-VPN system proposed in this study is easy to implement the existing IPSec-VPN system. Moreover, it has merit to guarantee the interoperability with other IPSec-VPN systems. Furthermore, the user authorization engine designed and implemented in this paper will provide not only DAC(Discretional Access Control) and RBAC(Role-Based Access Control) using an attribute certificate, but also the function of SSO(Single-Sign-On).

Design and Implementation of LED Streetlight System for Remote Control and Wi-Fi Service (원격제어 및 Wi-Fi 서비스가 가능한 LED 가로 등 시스템 설계 및 구현)

  • Lee, Sang Hoon;Shin, Soo Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.233-239
    • /
    • 2015
  • The demand of remote control and monitoring for efficiency and applications of LED streetlight is increasing continuously because the demand of LED streetlight was increase last few years. Existing street light remote control system is wired using a power line network. The wireless connection exists, but due to its low data transmission rate, it cannot support specialized applications. It can only support simple control and monitoring. In this paper, we propose a system that uses a IEEE 802.11s wireless mesh network based on WLAN, as a backbone network for remote control and monitoring of the LED street lights along with other specialized applications. Using the wireless mesh network for remote control and monitoring the LED street lights, the same can be used to act like a public Wi-Fi access point. We have designed Wi-Fi integrated LED streetlight controller and implemented our system. We evaluated the performance of our system on a real test bed. Our proposed system is expected to perform the role of a U-city infrastructure by utilizing the wireless mesh network.

A Development of the Unified Object-Oriented Analysis and Design Methodology for Security-Critical Web Applications Based on Relational Database (웹 응용시스템 개발을 위한 보안을 고려한 통합 분석.설계 방법론 개발)

  • Woo, Jung-Woong;Kim, Dong-Seob;Joo, Kyung-Soo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.243-247
    • /
    • 2013
  • 응용시스템 개발 과정에 있어서 중요하고 핵심을 이루는 작업은 분석과 설계 작업이며 아울러 대부분의 응용시스템은 데이터베이스 기반으로 구축된다. 또한, 응용시스템들은 외부 공격에 쉽게 노출되기 때문에 보안과 관련된 처리 과정 역시 중요하다. 하지만 이러한 보안은 대부분 개발 마지막 과정에서 고려하기 때문에 보안에 취약한 응용시스템들이 개발될 가능성이 매우 높다. 따라서 개발 초기에 보안을 반영한 분석 및 설계 과정이 매우 중요하다. Java EE는 웹 응용시스템을 위한 보안 방안을 제공하고 아울러 관계형 데이터베이스도 보안을 위하여 역할기반 접근제어를 지원하고 있지만 관계형 데이터베이스 및 Java EE의 역할기반 접근제어를 활용하는, 요구사항 수집부터 구현까지 개발 단계 전체에 걸친 일관된 개발방법론은 전무한 실정이다. 따라서 본 논문에서는 보안 요구사항을 요구사항 수집부터 분석 및 설계 그리고 마지막 구현 단계까지 반영하여 Java EE 기반의 웹 응용시스템을 개발하기 위한, 보안을 고려한 일관된 통합 분석.설계 방법론을 제안한다.

  • PDF

Theory and practice of the interlibrary loan service (상호대차(相互貸償) 제도의 이론(理論)과 응용)

  • Chun Myung Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.13
    • /
    • pp.39-71
    • /
    • 1986
  • Interlibrary loan has been a very common library service in the developed countries but it is yet to be actualized formerly in Korea. As Korea is moving toward an information society where all the individual user's request in the library should be met, we need to understand, in detail, the theory and practice of interlibrary loan service. As various information technology has been applied to the libraries, the libraries became the open system. Thus, the libraries become more cooperative, form networks, and make interlibrary loan service available. This study is based on the following three hypothesis formulated from the systems theory. 1. If libraries cooperate each other and form some kind of networks by mail, computers or telecommunications, they become the open system. 2. If a library develops as the open system, interlibrary loan becomes available in the library. 3. If the interlibrary loan system works, the role of the librarians will be changed. The research was carried out by analyzing the various studies about interlibrary loan service and by examining the interlibrary loan systerns presently working in the U.S.. The conclusions are reached deductively from the data. Some of the terminology used are defined as follows: System: a network of interrelated procedures that are joined together to perform an activity or to accomplish a specific objective. It is, in effect, all the ingredient which make up the whole. Cooperation: Working together to benefit participant libraries. Network: a much more structured type of cooperation in which definite regions or areas are connected by electronic or other means to promote interlibrary loaning of materials, in-service traing & other sharing of resources. Interlibrary loan: the lending of books between libraries. The model of cooperation or networks was used to be (1) a star type, (2) a hieranchical type, (3) a distributed type or (4) the combination of aforementioned three. However, the development of the telecommunications and computers enables all kinds of libraires cooperate together. Interlibrary loan service starts with the needs of user's information. The information have to be logically accessed through bibliographies, computers, electronic mails and satellite communications. And the logical access requires the information technology and the libraries become cooperative. The physical access to the information follows next but only traditional method of mail and some commercial service are currently available for this purpose. Therefore, researches are needed to develop this physical access. If the libraries form networks, the microaspect of library changes accordingly as the macroaspect changes. If the libraries . cooperate to become one large world library, the librarians plan, organize, control library operations and report the results. And the librarians work inside and outside of the library to cooperate with other libraries. Only the cooperation of the libraries will enhance interlibrary loan and the Korean librarians have to be prepared to accept the new role of librarianship for the interlibrary loan service.

  • PDF

A Feasibility Review for an Uneven Baseline Basis Minimal Ballast Ship

  • Kang, Hee Jin;Kim, Kwang-Soo;Choi, Jin;Lee, Yeong-Yeon;Ahn, Haeseong;Yim, Geun-Tae
    • Journal of Ocean Engineering and Technology
    • /
    • v.34 no.1
    • /
    • pp.1-12
    • /
    • 2020
  • Although there are many kinds of advanced ballast water management systems, pioneering studies for ballast-water free ship and minimal ballast water ship concepts are in progress. In this study, the existing alternatives of ballast water are reviewed and a new design concept is studied on the basis of the existing bulk carrier hull form. To develop a new design alternative which has minimal ballast for ballast water discharge free operation, the new concept should have technical feasibilities that are related to the role of the ballast water, berth access, loading constraints, etc. For this purpose, a simplified systems engineering basis design approach is adopted using a business model as the system analysis and control tool. To check the performance feasibility of the new concept, ship resistance performance is reviewed based on a model scale ship resistance performance analysis.

A Design of Role Based Access Control Manager in Distributed Virtual Environment (분산 가상 환경에서 역할 기반 접근 제어 관리자 설계)

  • Jung, Heon-Man;Tak, Jin-Hyun;Lee, Sei-Hoon;Wang, Chang-Jong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.175-180
    • /
    • 2000
  • 분산 가상 환경은 고속 통신망과 컴퓨팅 환경의 고급화로 응용 분야를 넓혀 가고 있으며, 보다 현실감 있는 상호작용으로 인해 만남과 대화, 협력 작업, 상거래, 오락 등의 인간의 사회적 활동을 지원하는 새로운 수단으로 자리잡고 있다. 가상 도시와 같은 대규모의 가상 환경에는 공원이나 거리, 건물의 로비 등과 같은 개방적인 공간과 사무실과 같은 업무 공간, 그리고 쇼핑몰과 같은 상거래 공간들이 공존하게 되므로 접근 제어와 보안이 보다 중요한 문제로 대두된다. 따라서, 이 논문에서는 분산 가상 환경내의 모든 사물들을 객체로 인식하고, 객체에 대한 역할을 기반으로 하는 접근 제어 모델을 제안하고, 제안한 모델을 기반으로 접근 제어 관리자를 설계하였다. 설계된 접근 제어 관리자는 가상 환경내 공간의 객체 뿐만 아니라 공간 자체도 하나의 객체로 인식하여 접근 제어를 하였다. 또한, 대규모 공간에서의 중요한 특징인 관리의 용이성과 동적인 변경을 가능하게 하기 위해, 역할을 기반으로 참여자와 객체를 연결하고, 객체가 갖고 있는 행위까지를 제어할 수 있었다.

  • PDF